Understand the consequences for violating the rules

Understand the consequences for violating the rules

Access to computing and information resources is a privilege granted by the University to its students. The University reserves the right to limit, restrict, or extend computing privileges and access to its information resources. In order to retain the privilege of using UD's computing and information technology resources, you must follow the University's policies as outlined in UD's Student Guide to University Policies.

Consequences for violating University policies could include:

Be aware that the University will not protect you from the legal consequences of your misuse of IT resources. If you use the University's network or other IT resources to threaten or harass others, violate copyright laws, or cause other harm, you will be held accountable for your actions. The University will cooperate with law enforcement agencies and other entities in investigations into these violations.

In addition, if your computer is infected with malware that could affect other computers on our network, your computer's access to the network will be suspended until the malware is removed. This step is required to protect the University's network and all devices connected to it. It your computer is infected multiple times and its network access suspended multiple times, you won't be able to reconnect it until UD IT services it. You will be charged for this service.

You are always responsible for your use of IT resources.

Tips for avoiding violations—and their consequences

Your responsibilities as a student

As a student at the University, you're responsible for protecting yourself, your information, and your devices as well as the University's IT resources as you use them.

  1. Use IT resources appropriately
  2. Take responsibility for your device's activity
  3. Protect and clean your computer
  4. Use strong and unique passwords
  5. Protect yourself from phishing and other fraud
  6. Understand copyright laws and file sharing
  7. Protect your online reputation
  8. Understand the consequences for violating the rules